mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2023-05-23T14:00:32.463747+00:00
This commit is contained in:
parent
443531bfbd
commit
a006e81b46
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-17191",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2018-12-31T14:29:00.240",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-23T13:31:35.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,8 +84,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:netbeans:9.0:incubating:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C320207E-B417-4343-878E-9CF674614A10"
|
||||
"criteria": "cpe:2.3:a:apache:netbeans:9.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B8A3293-9EB3-44A7-9CBA-B2594311D8F4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-12671",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2019-09-25T21:15:11.750",
|
||||
"lastModified": "2019-10-09T23:46:02.310",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -131,6 +131,51 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*",
|
||||
@ -211,51 +256,6 @@
|
||||
"criteria": "cpe:2.3:h:cisco:encs5412\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "313B08AE-E0ED-43E8-A182-9578CFA1BFD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:sasr1k1xucmk9-1610:-:*:*:*:*:*:*:*",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-16010",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-03-19T16:15:14.517",
|
||||
"lastModified": "2020-03-23T17:56:58.380",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,23 +129,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-16012",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-03-19T16:15:14.627",
|
||||
"lastModified": "2020-03-23T17:18:01.463",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,23 +129,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-20012",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:09.627",
|
||||
"lastModified": "2023-05-23T01:15:09.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3141",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:17.323",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -141,16 +141,46 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -576,36 +606,6 @@
|
||||
"criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3180",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-07-16T18:15:16.940",
|
||||
"lastModified": "2020-07-23T19:13:12.977",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -130,28 +130,28 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3264",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-03-19T16:15:15.487",
|
||||
"lastModified": "2022-07-19T11:50:53.083",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -161,23 +161,23 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3265",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-03-19T16:15:15.613",
|
||||
"lastModified": "2022-03-17T16:05:01.163",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -156,23 +156,23 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3266",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-03-19T16:15:15.690",
|
||||
"lastModified": "2020-03-23T18:47:47.613",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,23 +129,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3315",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-05-06T17:15:13.823",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -168,6 +168,21 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -232,21 +247,6 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isa-3000-4c-k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D7A3FA6-CAAB-4F64-8EC8-B12FE45D8E22"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3372",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-07-16T18:15:18.487",
|
||||
"lastModified": "2020-07-24T18:09:05.497",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -136,23 +136,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3378",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-07-16T18:15:18.597",
|
||||
"lastModified": "2020-07-24T18:13:06.390",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -136,23 +136,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3381",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-07-16T18:15:18.907",
|
||||
"lastModified": "2020-07-23T16:20:41.607",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -143,23 +143,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3387",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-07-16T18:15:19.127",
|
||||
"lastModified": "2021-08-06T18:58:52.680",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -143,23 +143,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3388",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-07-16T18:15:19.220",
|
||||
"lastModified": "2020-07-23T15:36:22.017",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -143,23 +143,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3393",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:17.587",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -126,16 +126,46 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -561,36 +591,6 @@
|
||||
"criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3396",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:17.683",
|
||||
"lastModified": "2020-10-15T18:05:10.117",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -126,6 +126,81 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
|
||||
@ -325,81 +400,6 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62081293-8355-4197-A5A8-1E434B808680"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3401",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-07-16T18:15:19.300",
|
||||
"lastModified": "2020-07-23T15:03:36.620",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,23 +129,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3404",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:18.073",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -126,16 +126,46 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -561,36 +591,6 @@
|
||||
"criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3407",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:18.183",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -126,16 +126,46 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -561,36 +591,6 @@
|
||||
"criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3408",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:18.260",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -131,16 +131,46 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -566,36 +596,6 @@
|
||||
"criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3503",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:20.887",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -126,16 +126,46 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -561,36 +591,6 @@
|
||||
"criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3508",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:20.963",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -688,16 +688,46 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -748,6 +778,51 @@
|
||||
"criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -807,81 +882,6 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62081293-8355-4197-A5A8-1E434B808680"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3511",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:21.230",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -126,16 +126,46 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -191,6 +221,51 @@
|
||||
"criteria": "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03A273EE-41C1-41E9-9002-46F83FC6533F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -300,81 +375,6 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62081293-8355-4197-A5A8-1E434B808680"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-34723",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2021-09-23T03:15:18.427",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -237,33 +237,33 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202"
|
||||
"criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275"
|
||||
"criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20775",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2022-09-30T19:15:11.467",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -288,16 +288,61 @@
|
||||
"criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -532,51 +577,6 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F403859-F034-4DD9-9CA5-708EADECB380"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20818",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2022-09-30T19:15:11.867",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-05-23T13:55:46.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -236,16 +236,61 @@
|
||||
"criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
|
||||
@ -480,51 +525,6 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F403859-F034-4DD9-9CA5-708EADECB380"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-46658",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T23:15:09.270",
|
||||
"lastModified": "2023-05-22T23:15:09.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-46738",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T23:15:09.350",
|
||||
"lastModified": "2023-05-22T23:15:09.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47311",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T23:15:09.423",
|
||||
"lastModified": "2023-05-22T23:15:09.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47320",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T23:15:09.493",
|
||||
"lastModified": "2023-05-22T23:15:09.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4945",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T22:15:09.870",
|
||||
"lastModified": "2023-05-22T22:15:09.870",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22654",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.173",
|
||||
"lastModified": "2023-05-23T02:15:09.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23545",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.230",
|
||||
"lastModified": "2023-05-23T02:15:09.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23693",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2023-05-23T07:15:10.163",
|
||||
"lastModified": "2023-05-23T07:15:10.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23694",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2023-05-23T07:15:10.317",
|
||||
"lastModified": "2023-05-23T07:15:10.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-237xx/CVE-2023-23706.json
Normal file
55
CVE-2023/CVE-2023-237xx/CVE-2023-23706.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-23706",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-23T13:15:09.410",
|
||||
"lastModified": "2023-05-23T13:42:55.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin <=\u00a07.5.14 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/miniorange-login-openid/wordpress-wordpress-social-login-and-register-discord-google-twitter-linkedin-plugin-7-5-14-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-237xx/CVE-2023-23724.json
Normal file
55
CVE-2023/CVE-2023-237xx/CVE-2023-23724.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-23724",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-23T13:15:09.487",
|
||||
"lastModified": "2023-05-23T13:42:55.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Winwar Media WP Email Capture plugin <=\u00a03.9.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-email-capture/wordpress-wordpress-email-marketing-plugin-wp-email-capture-plugin-3-9-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
15
CVE-2023/CVE-2023-24xx/CVE-2023-2483.json
Normal file
15
CVE-2023/CVE-2023-24xx/CVE-2023-2483.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-2483",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T13:15:09.783",
|
||||
"lastModified": "2023-05-23T13:15:09.783",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25183",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T21:15:13.633",
|
||||
"lastModified": "2023-05-22T21:15:13.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25440",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:09.727",
|
||||
"lastModified": "2023-05-23T01:15:09.727",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-254xx/CVE-2023-25472.json
Normal file
55
CVE-2023/CVE-2023-254xx/CVE-2023-25472.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-25472",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-23T13:15:09.563",
|
||||
"lastModified": "2023-05-23T13:42:55.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher plugin <=\u00a03.8.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-3-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-254xx/CVE-2023-25481.json
Normal file
55
CVE-2023/CVE-2023-254xx/CVE-2023-25481.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-25481",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-23T13:15:09.637",
|
||||
"lastModified": "2023-05-23T13:42:55.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Subscribe button plugin <=\u00a01.3.7 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/podlove-subscribe-button/wordpress-podlove-subscribe-button-plugin-1-3-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-257xx/CVE-2023-25707.json
Normal file
55
CVE-2023/CVE-2023-257xx/CVE-2023-25707.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-25707",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-23T13:15:09.707",
|
||||
"lastModified": "2023-05-23T13:42:55.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin <=\u00a01.5.12 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-hotel-booking-engine-pms-plugin-1-5-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25946",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.273",
|
||||
"lastModified": "2023-05-23T02:15:09.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25953",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.317",
|
||||
"lastModified": "2023-05-23T02:15:09.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2504",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T22:15:10.277",
|
||||
"lastModified": "2023-05-22T22:15:10.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2505",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T22:15:10.350",
|
||||
"lastModified": "2023-05-22T22:15:10.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26595",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.353",
|
||||
"lastModified": "2023-05-23T02:15:09.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27066",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T17:15:09.347",
|
||||
"lastModified": "2023-05-22T17:15:09.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27067",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T19:15:09.960",
|
||||
"lastModified": "2023-05-22T19:15:09.960",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27068",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:09.773",
|
||||
"lastModified": "2023-05-23T01:15:09.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27304",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.397",
|
||||
"lastModified": "2023-05-23T02:15:09.397",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27384",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.437",
|
||||
"lastModified": "2023-05-23T02:15:09.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27387",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.480",
|
||||
"lastModified": "2023-05-23T02:15:09.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27388",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.527",
|
||||
"lastModified": "2023-05-23T02:15:09.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27397",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.570",
|
||||
"lastModified": "2023-05-23T02:15:09.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27507",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.610",
|
||||
"lastModified": "2023-05-23T02:15:09.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27512",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.653",
|
||||
"lastModified": "2023-05-23T02:15:09.653",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27514",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.700",
|
||||
"lastModified": "2023-05-23T02:15:09.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27518",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.743",
|
||||
"lastModified": "2023-05-23T02:15:09.743",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27521",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.787",
|
||||
"lastModified": "2023-05-23T02:15:09.787",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27920",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.827",
|
||||
"lastModified": "2023-05-23T02:15:09.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27921",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.867",
|
||||
"lastModified": "2023-05-23T02:15:09.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27922",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.907",
|
||||
"lastModified": "2023-05-23T02:15:09.907",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27923",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.943",
|
||||
"lastModified": "2023-05-23T02:15:09.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27925",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.983",
|
||||
"lastModified": "2023-05-23T02:15:09.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27926",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:10.023",
|
||||
"lastModified": "2023-05-23T02:15:10.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28367",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:10.067",
|
||||
"lastModified": "2023-05-23T02:15:10.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28386",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T20:15:10.250",
|
||||
"lastModified": "2023-05-22T20:15:10.250",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28390",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:10.107",
|
||||
"lastModified": "2023-05-23T02:15:10.107",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28392",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:10.140",
|
||||
"lastModified": "2023-05-23T02:15:10.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28394",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:10.180",
|
||||
"lastModified": "2023-05-23T02:15:10.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28408",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:10.220",
|
||||
"lastModified": "2023-05-23T02:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28409",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:10.257",
|
||||
"lastModified": "2023-05-23T02:15:10.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28412",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T20:15:10.330",
|
||||
"lastModified": "2023-05-22T20:15:10.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28413",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:10.293",
|
||||
"lastModified": "2023-05-23T02:15:10.293",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28467",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T19:15:10.017",
|
||||
"lastModified": "2023-05-22T19:15:10.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28649",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T20:15:10.417",
|
||||
"lastModified": "2023-05-22T20:15:10.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2837",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-22T18:15:09.163",
|
||||
"lastModified": "2023-05-22T18:15:09.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2838",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-22T18:15:09.293",
|
||||
"lastModified": "2023-05-22T18:15:09.293",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2839",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-22T18:15:09.360",
|
||||
"lastModified": "2023-05-22T18:15:09.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2840",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-22T18:15:09.423",
|
||||
"lastModified": "2023-05-22T18:15:09.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2844",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-23T04:15:09.497",
|
||||
"lastModified": "2023-05-23T04:15:09.497",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2845",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-23T05:15:08.827",
|
||||
"lastModified": "2023-05-23T05:15:08.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29838",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T20:15:10.493",
|
||||
"lastModified": "2023-05-22T20:15:10.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29919",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:09.820",
|
||||
"lastModified": "2023-05-23T01:15:09.820",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30469",
|
||||
"sourceIdentifier": "hirt@hitachi.co.jp",
|
||||
"published": "2023-05-23T02:15:10.333",
|
||||
"lastModified": "2023-05-23T02:15:10.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31193",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T20:15:10.550",
|
||||
"lastModified": "2023-05-22T20:15:10.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31240",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T20:15:10.633",
|
||||
"lastModified": "2023-05-22T20:15:10.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31241",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T20:15:10.720",
|
||||
"lastModified": "2023-05-22T20:15:10.720",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31245",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-05-22T20:15:10.807",
|
||||
"lastModified": "2023-05-22T20:15:10.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31584",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T19:15:10.090",
|
||||
"lastModified": "2023-05-22T19:15:10.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31664",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:09.867",
|
||||
"lastModified": "2023-05-23T01:15:09.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-316xx/CVE-2023-31669.json
Normal file
20
CVE-2023/CVE-2023-316xx/CVE-2023-31669.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31669",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T12:15:09.173",
|
||||
"lastModified": "2023-05-23T13:04:30.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WebAssembly wat2wasm v1.0.32 allows attackers to cause a libc++abi.dylib crash by putting '@' before a quote (\")."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WebAssembly/wabt/issues/2165",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31670",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:09.917",
|
||||
"lastModified": "2023-05-23T01:15:09.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31689",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T20:15:10.887",
|
||||
"lastModified": "2023-05-22T20:15:10.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31708",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:09.960",
|
||||
"lastModified": "2023-05-23T01:15:09.960",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31740",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:10.003",
|
||||
"lastModified": "2023-05-23T01:15:10.003",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-23T13:04:39.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user